Movatterモバイル変換


[0]ホーム

URL:


US20050033984A1 - Intrusion Detection - Google Patents

Intrusion Detection
Download PDF

Info

Publication number
US20050033984A1
US20050033984A1US10/605,689US60568903AUS2005033984A1US 20050033984 A1US20050033984 A1US 20050033984A1US 60568903 AUS60568903 AUS 60568903AUS 2005033984 A1US2005033984 A1US 2005033984A1
Authority
US
United States
Prior art keywords
host
database
digital signature
intrusion
per
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US10/605,689
Other versions
US7565690B2 (en
Inventor
James Doherty
Thomas Adams
Stephen Mueller
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
AT&T Intellectual Property I LP
Original Assignee
SBC Knowledge Ventures LP
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US10/634,117external-prioritypatent/US20050033976A1/en
Application filed by SBC Knowledge Ventures LPfiledCriticalSBC Knowledge Ventures LP
Priority to US10/605,689priorityCriticalpatent/US7565690B2/en
Assigned to SBC KNOWLEDGE VENTURES, L.P.reassignmentSBC KNOWLEDGE VENTURES, L.P.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: ADAMS, THOMAS LEE, DOHERTY, JAMES M., MUELLER, STEPHEN MARK
Priority to PCT/US2004/022743prioritypatent/WO2005031499A2/en
Publication of US20050033984A1publicationCriticalpatent/US20050033984A1/en
Application grantedgrantedCritical
Publication of US7565690B2publicationCriticalpatent/US7565690B2/en
Assigned to AT&T KNOWLEDGE VENTURES, L.P.reassignmentAT&T KNOWLEDGE VENTURES, L.P.CHANGE OF NAME (SEE DOCUMENT FOR DETAILS).Assignors: SBC KNOWLEDGE VENTURES, L.P.
Assigned to AT&T INTELLECTUAL PROPERTY I, L.P.reassignmentAT&T INTELLECTUAL PROPERTY I, L.P.CHANGE OF NAME (SEE DOCUMENT FOR DETAILS).Assignors: AT&T KNOWLEDGE VENTURES, L.P.
Expired - Fee Relatedlegal-statusCriticalCurrent
Adjusted expirationlegal-statusCritical

Links

Images

Classifications

Definitions

Landscapes

Abstract

A system daemon starts through normal system startup procedures and reads its configuration file to determine which data entities (e.g., directories and files) are to be monitored. The monitoring includes a valid MD5 signature, correct permissions, ownership of the file, and an existence of the file. If any modification are made to the data entities, then the system daemon generates an alarm (intended for the administrator of the host) that an intrusion has taken place. Once an intrusion is detected, then the isolating steps or commands are issued in a real-time continuous manner to protect the host system from attack or intrusion.

Description

Claims (24)

10. A system to detect intrusion comprising:
a. a host running a monitoring daemon working in conjunction with a configuration file, said configuration file identifying files and directories to be monitored in said host and said host communicating with external networks via one or more network interfaces, said monitoring daemon dynamically monitoring said files and directories identified by said configuration file by comparing a locally stored digital signature corresponding to each file or directory against a remotely stored corresponding digital signature;
b. a digital signature database remote from said host storing said digital signatures associated with files and directories identified by said configuration file; and
c. a log database remote from said host recording entries corresponding to mismatches between a digital signature stored in said host and a corresponding digital signature in said digital signature database.
18. An intrusion detection and isolation method implemented using a monitoring daemon in a host, said host having one or more network interfaces to communicate over one or more networks, said method comprising the steps of:
a. reading a configuration file to identify data entities to be monitored on a host;
b. for each data entity to be monitored, extracting a digital signature from said host;
c. for each data entity to be monitored, querying a remote digital signature database via said one or more network interfaces and requesting a digital signature corresponding to said digital signature extracted from said host;
d. for each data entity to be monitored, receiving said corresponding digital signature from said remote digital signature database;
e. matching digital signature received from said remote digital signature database with digital signature extracted at said host;
f. upon identifying a mismatch, transmitting an instruction to a remote log database via said one or more network interfaces, said instruction executed in said remote log database to record an entry in a log file indicating a possible intrusion in said host; and
g. performing any one of, or a combination of, the following steps:
(i) issuing a command to bring down said one or more network interfaces to isolate said host; or
(ii) issuing a command to an operating system of host to bring said host to a single user state.
US10/605,6892003-08-042003-10-17Intrusion detectionExpired - Fee RelatedUS7565690B2 (en)

Priority Applications (2)

Application NumberPriority DateFiling DateTitle
US10/605,689US7565690B2 (en)2003-08-042003-10-17Intrusion detection
PCT/US2004/022743WO2005031499A2 (en)2003-08-042004-07-16Host intrusion detection and isolation

Applications Claiming Priority (2)

Application NumberPriority DateFiling DateTitle
US10/634,117US20050033976A1 (en)2003-08-042003-08-04Host intrusion detection and isolation
US10/605,689US7565690B2 (en)2003-08-042003-10-17Intrusion detection

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US10/634,117Continuation-In-PartUS20050033976A1 (en)2003-08-042003-08-04Host intrusion detection and isolation

Publications (2)

Publication NumberPublication Date
US20050033984A1true US20050033984A1 (en)2005-02-10
US7565690B2 US7565690B2 (en)2009-07-21

Family

ID=34396630

Family Applications (1)

Application NumberTitlePriority DateFiling Date
US10/605,689Expired - Fee RelatedUS7565690B2 (en)2003-08-042003-10-17Intrusion detection

Country Status (2)

CountryLink
US (1)US7565690B2 (en)
WO (1)WO2005031499A2 (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20070274230A1 (en)*2006-05-232007-11-29Werber Ryan ASystem and method for modifying router firmware
CN100383750C (en)*2006-06-072008-04-23中国科学院计算技术研究所 A method for implementing a high-reliability log system for large-scale computing systems
US7571485B1 (en)*2005-03-302009-08-04Symantec CorporationUse of database schema for fraud prevention and policy compliance
US20140208420A1 (en)*2013-01-232014-07-24Owl Computing Technologies, Inc.System for remotely monitoring status information of devices connected to a network
WO2014210246A1 (en)*2013-06-282014-12-31Mcafee, Inc.Rootkit detection by using hardware resources to detect inconsistencies in network traffic
CN107517226A (en)*2017-09-302017-12-26北京奇虎科技有限公司 Alarm method and device based on wireless network intrusion
US9877100B1 (en)2016-08-292018-01-23Motorola Mobility LlcAudio sensing to alert device user
US11178223B2 (en)*2018-11-072021-11-16Phacil, LlcSystem and method for non-network dependent cybersecurity
US11762992B2 (en)2021-09-272023-09-19Hubei UniversityIntrusion detection method based on improved immune network algorithm, and application thereof

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US7975298B1 (en)*2006-03-292011-07-05Mcafee, Inc.System, method and computer program product for remote rootkit detection
US9363675B2 (en)*2006-06-152016-06-07Cisco Technology, Inc.Distributed wireless security system
US9584587B2 (en)*2015-02-032017-02-28Fortinet, Inc.Managing transmission and storage of sensitive data

Citations (38)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5919257A (en)*1997-08-081999-07-06Novell, Inc.Networked workstation intrusion detection system
US6081894A (en)*1997-10-222000-06-27Rvt Technologies, Inc.Method and apparatus for isolating an encrypted computer system upon detection of viruses and similar data
US6321338B1 (en)*1998-11-092001-11-20Sri InternationalNetwork surveillance
US20020032798A1 (en)*2000-09-082002-03-14Wei XuSystems and methods for packet sequencing
US20020069369A1 (en)*2000-07-052002-06-06Tremain Geoffrey DonaldMethod and apparatus for providing computer services
US20020078382A1 (en)*2000-11-292002-06-20Ali SheikhScalable system for monitoring network system and components and methodology therefore
US20020112185A1 (en)*2000-07-102002-08-15Hodges Jeffrey D.Intrusion threat detection
US20020129264A1 (en)*2001-01-102002-09-12Rowland Craig H.Computer security and management system
US20020162026A1 (en)*2001-02-062002-10-31Michael NeumanApparatus and method for providing secure network communication
US20030051026A1 (en)*2001-01-192003-03-13Carter Ernst B.Network surveillance and security system
US20030097431A1 (en)*2001-09-292003-05-22Dill Russell J.Ethernet firewall multi-access appliance
US20030101358A1 (en)*2001-11-282003-05-29Porras Phillip AndrewApplication-layer anomaly and misuse detection
US6584565B1 (en)*1997-07-152003-06-24Hewlett-Packard Development Company, L.P.Method and apparatus for long term verification of digital signatures
US20030120935A1 (en)*2001-12-202003-06-26Coretrace CorporationKernel-based network security infrastructure
US20030154399A1 (en)*2002-02-082003-08-14Nir ZukMulti-method gateway-based network security systems and methods
US20030159070A1 (en)*2001-05-282003-08-21Yaron MayerSystem and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages
US20030163704A1 (en)*2002-02-252003-08-28Dick Kevin StewartSystem, method and computer program product for guaranteeing electronic transactions
US20030182580A1 (en)*2001-05-042003-09-25Lee Jai-HyoungNetwork traffic flow control system
US20030204728A1 (en)*2002-04-302003-10-30Tippingpoint Technologies, Inc.Steganographically authenticated packet traffic
US6647400B1 (en)*1999-08-302003-11-11Symantec CorporationSystem and method for analyzing filesystems to detect intrusions
US20030217289A1 (en)*2002-05-172003-11-20Ken AmmonMethod and system for wireless intrusion detection
US6654882B1 (en)*2002-05-242003-11-25Rackspace, LtdNetwork security system protecting against disclosure of information to unauthorized agents
US20040025015A1 (en)*2002-01-042004-02-05Internet Security SystemsSystem and method for the managed security control of processes on a computer system
US20040049693A1 (en)*2002-09-112004-03-11Enterasys Networks, Inc.Modular system for detecting, filtering and providing notice about attack events associated with network security
US6725377B1 (en)*1999-03-122004-04-20Networks Associates Technology, Inc.Method and system for updating anti-intrusion software
US20040078568A1 (en)*2002-10-162004-04-22Duc PhamSecure file system server architecture and methods
US6735702B1 (en)*1999-08-312004-05-11Intel CorporationMethod and system for diagnosing network intrusion
US6775657B1 (en)*1999-12-222004-08-10Cisco Technology, Inc.Multilayered intrusion detection system and method
US20050039047A1 (en)*2003-07-242005-02-17Amit RaikarMethod for configuring a network intrusion detection system
US6961763B1 (en)*1999-08-172005-11-01Microsoft CorporationAutomation system for controlling and monitoring devices and sensors
US20050262343A1 (en)*2003-05-022005-11-24Jorgensen Jimi TPervasive, user-centric network security enabled by dynamic datagram switch and an on-demand authentication and encryption scheme through mobile intelligent data carriers
US7117504B2 (en)*2001-07-102006-10-03Microsoft CorporationApplication program interface that enables communication for a network software platform
US7124438B2 (en)*2002-03-082006-10-17Ciphertrust, Inc.Systems and methods for anomaly detection in patterns of monitored communications
US7133729B1 (en)*1999-08-172006-11-07Microsoft CorporationPattern-and model-based power line monitoring
US7140041B2 (en)*2002-04-112006-11-21International Business Machines CorporationDetecting dissemination of malicious programs
US7155745B1 (en)*1999-10-152006-12-26Fuji Xerox Co., Ltd.Data storage device provided with function for user's access right
US7194623B1 (en)*1999-05-282007-03-20Hewlett-Packard Development Company, L.P.Data event logging in computing platform
US7213260B2 (en)*2002-03-082007-05-01Secure Computing CorporationSystems and methods for upstream threat pushback

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5923884A (en)1996-08-301999-07-13Gemplus S.C.A.System and method for loading applications onto a smart card
US7096497B2 (en)2001-03-302006-08-22Intel CorporationFile checking using remote signing authority via a network

Patent Citations (39)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6584565B1 (en)*1997-07-152003-06-24Hewlett-Packard Development Company, L.P.Method and apparatus for long term verification of digital signatures
US5919257A (en)*1997-08-081999-07-06Novell, Inc.Networked workstation intrusion detection system
US6081894A (en)*1997-10-222000-06-27Rvt Technologies, Inc.Method and apparatus for isolating an encrypted computer system upon detection of viruses and similar data
US6321338B1 (en)*1998-11-092001-11-20Sri InternationalNetwork surveillance
US6725377B1 (en)*1999-03-122004-04-20Networks Associates Technology, Inc.Method and system for updating anti-intrusion software
US7194623B1 (en)*1999-05-282007-03-20Hewlett-Packard Development Company, L.P.Data event logging in computing platform
US7133729B1 (en)*1999-08-172006-11-07Microsoft CorporationPattern-and model-based power line monitoring
US6961763B1 (en)*1999-08-172005-11-01Microsoft CorporationAutomation system for controlling and monitoring devices and sensors
US6647400B1 (en)*1999-08-302003-11-11Symantec CorporationSystem and method for analyzing filesystems to detect intrusions
US6735702B1 (en)*1999-08-312004-05-11Intel CorporationMethod and system for diagnosing network intrusion
US7155745B1 (en)*1999-10-152006-12-26Fuji Xerox Co., Ltd.Data storage device provided with function for user's access right
US6775657B1 (en)*1999-12-222004-08-10Cisco Technology, Inc.Multilayered intrusion detection system and method
US20020069369A1 (en)*2000-07-052002-06-06Tremain Geoffrey DonaldMethod and apparatus for providing computer services
US20020112185A1 (en)*2000-07-102002-08-15Hodges Jeffrey D.Intrusion threat detection
US20020032798A1 (en)*2000-09-082002-03-14Wei XuSystems and methods for packet sequencing
US20020078382A1 (en)*2000-11-292002-06-20Ali SheikhScalable system for monitoring network system and components and methodology therefore
US20020129264A1 (en)*2001-01-102002-09-12Rowland Craig H.Computer security and management system
US7058968B2 (en)*2001-01-102006-06-06Cisco Technology, Inc.Computer security and management system
US20030051026A1 (en)*2001-01-192003-03-13Carter Ernst B.Network surveillance and security system
US20020162026A1 (en)*2001-02-062002-10-31Michael NeumanApparatus and method for providing secure network communication
US20030182580A1 (en)*2001-05-042003-09-25Lee Jai-HyoungNetwork traffic flow control system
US20030159070A1 (en)*2001-05-282003-08-21Yaron MayerSystem and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages
US7117504B2 (en)*2001-07-102006-10-03Microsoft CorporationApplication program interface that enables communication for a network software platform
US20030097431A1 (en)*2001-09-292003-05-22Dill Russell J.Ethernet firewall multi-access appliance
US20030101358A1 (en)*2001-11-282003-05-29Porras Phillip AndrewApplication-layer anomaly and misuse detection
US20030120935A1 (en)*2001-12-202003-06-26Coretrace CorporationKernel-based network security infrastructure
US20040025015A1 (en)*2002-01-042004-02-05Internet Security SystemsSystem and method for the managed security control of processes on a computer system
US20030154399A1 (en)*2002-02-082003-08-14Nir ZukMulti-method gateway-based network security systems and methods
US20030163704A1 (en)*2002-02-252003-08-28Dick Kevin StewartSystem, method and computer program product for guaranteeing electronic transactions
US7213260B2 (en)*2002-03-082007-05-01Secure Computing CorporationSystems and methods for upstream threat pushback
US7124438B2 (en)*2002-03-082006-10-17Ciphertrust, Inc.Systems and methods for anomaly detection in patterns of monitored communications
US7140041B2 (en)*2002-04-112006-11-21International Business Machines CorporationDetecting dissemination of malicious programs
US20030204728A1 (en)*2002-04-302003-10-30Tippingpoint Technologies, Inc.Steganographically authenticated packet traffic
US20030217289A1 (en)*2002-05-172003-11-20Ken AmmonMethod and system for wireless intrusion detection
US6654882B1 (en)*2002-05-242003-11-25Rackspace, LtdNetwork security system protecting against disclosure of information to unauthorized agents
US20040049693A1 (en)*2002-09-112004-03-11Enterasys Networks, Inc.Modular system for detecting, filtering and providing notice about attack events associated with network security
US20040078568A1 (en)*2002-10-162004-04-22Duc PhamSecure file system server architecture and methods
US20050262343A1 (en)*2003-05-022005-11-24Jorgensen Jimi TPervasive, user-centric network security enabled by dynamic datagram switch and an on-demand authentication and encryption scheme through mobile intelligent data carriers
US20050039047A1 (en)*2003-07-242005-02-17Amit RaikarMethod for configuring a network intrusion detection system

Cited By (14)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US7571485B1 (en)*2005-03-302009-08-04Symantec CorporationUse of database schema for fraud prevention and policy compliance
US20070274230A1 (en)*2006-05-232007-11-29Werber Ryan ASystem and method for modifying router firmware
CN100383750C (en)*2006-06-072008-04-23中国科学院计算技术研究所 A method for implementing a high-reliability log system for large-scale computing systems
US20140208420A1 (en)*2013-01-232014-07-24Owl Computing Technologies, Inc.System for remotely monitoring status information of devices connected to a network
US9712543B2 (en)*2013-01-232017-07-18Owl Cyber Defense Solutions, LLPSystem for remotely monitoring status information of devices connected to a network
WO2014210246A1 (en)*2013-06-282014-12-31Mcafee, Inc.Rootkit detection by using hardware resources to detect inconsistencies in network traffic
US9877100B1 (en)2016-08-292018-01-23Motorola Mobility LlcAudio sensing to alert device user
CN107517226A (en)*2017-09-302017-12-26北京奇虎科技有限公司 Alarm method and device based on wireless network intrusion
CN107517226B (en)*2017-09-302021-03-19北京奇虎科技有限公司 Alarm method and device based on wireless network intrusion
US11178223B2 (en)*2018-11-072021-11-16Phacil, LlcSystem and method for non-network dependent cybersecurity
US11399060B2 (en)2018-11-072022-07-26Phacil, LlcSystem and method for continuous AI management and learning
US11503117B2 (en)2018-11-072022-11-15Phacil, LlcSecure expeditionary AI sense-understand-decide-act system and method
US12041126B2 (en)2018-11-072024-07-16Phacil, LlcSystem and method for non-network dependent cybersecurity
US11762992B2 (en)2021-09-272023-09-19Hubei UniversityIntrusion detection method based on improved immune network algorithm, and application thereof

Also Published As

Publication numberPublication date
US7565690B2 (en)2009-07-21
WO2005031499A3 (en)2005-06-02
WO2005031499A2 (en)2005-04-07

Similar Documents

PublicationPublication DateTitle
EP1860590B1 (en)Posture-based data protection
CN100425025C (en) Security system and method for application server security law and network security law
US6298445B1 (en)Computer security
US7752662B2 (en)Method and apparatus for high-speed detection and blocking of zero day worm attacks
JP4327698B2 (en) Network type virus activity detection program, processing method and system
US7793094B2 (en)HTTP cookie protection by a network security device
US20070294759A1 (en)Wireless network control and protection system
US20050138402A1 (en)Methods and apparatus for hierarchical system validation
US20030208694A1 (en)Network security system and method
US7565690B2 (en)Intrusion detection
CN109936555A (en) A data storage method, device and system based on cloud platform
US7594268B1 (en)Preventing network discovery of a system services configuration
CN118075015A (en)Terminal protection method and system for electric power information system in network dynamic stealth environment
US20060047826A1 (en)Client computer self health check
CN116566654A (en)Protection system for block chain management server
WO1999056196A1 (en)Computer security
CN111556024B (en)Reverse access control system and method
Yoon et al.Security considerations based on classification of IoT device capabilities
US20080022397A1 (en)Systems and methods for managing network vulnerability
WO2003034687A1 (en)Method and system for securing computer networks using a dhcp server with firewall technology
JP4408837B2 (en) Authentication system
US12015719B1 (en)Apparatus, systems, and methods relying on non-flashable circuitry for improving security on public or private networks
US12088735B1 (en)Apparatus, systems, and methods relying on non-flashable circuitry for improving security on public or private networks
JP2003167786A (en) Network monitoring system
WO2022101934A1 (en)A system to protect data exfilteration through detection and validation and method thereof

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:SBC KNOWLEDGE VENTURES, L.P., NEVADA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:DOHERTY, JAMES M.;ADAMS, THOMAS LEE;MUELLER, STEPHEN MARK;REEL/FRAME:015014/0912

Effective date:20031114

FEPPFee payment procedure

Free format text:PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STCFInformation on status: patent grant

Free format text:PATENTED CASE

FPAYFee payment

Year of fee payment:4

FPAYFee payment

Year of fee payment:8

ASAssignment

Owner name:AT&T INTELLECTUAL PROPERTY I, L.P., GEORGIA

Free format text:CHANGE OF NAME;ASSIGNOR:AT&T KNOWLEDGE VENTURES, L.P.;REEL/FRAME:052045/0279

Effective date:20071001

Owner name:AT&T KNOWLEDGE VENTURES, L.P., NEVADA

Free format text:CHANGE OF NAME;ASSIGNOR:SBC KNOWLEDGE VENTURES, L.P.;REEL/FRAME:052045/0263

Effective date:20060224

FEPPFee payment procedure

Free format text:MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

LAPSLapse for failure to pay maintenance fees

Free format text:PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STCHInformation on status: patent discontinuation

Free format text:PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FPLapsed due to failure to pay maintenance fee

Effective date:20210721


[8]ページ先頭

©2009-2025 Movatter.jp